Information security attack-defense research based on the military balance operation mechanism
暂无分享,去创建一个
[1] Ye Zhiyuan. Stateful Security Alert Correlation by Dynamic Bayesian Plan Graph , 2006 .
[2] Wang Lei. Application of Network Cybernetics in Network Attack and Defense , 2006 .
[3] Zhi Ma,et al. Information Assurance Evaluation for Network Information Systems , 2006, 2006 International Conference on Computational Intelligence and Security.
[4] Huang Zun. On Survivabilty Techniques and Its Implementation Skeleton , 2002 .
[5] Denis Trèek,et al. An integral framework for information systems security management , 2003, Comput. Secur..